US20050265744A1 - Image forming apparatus and verification control method thereof - Google Patents

Image forming apparatus and verification control method thereof Download PDF

Info

Publication number
US20050265744A1
US20050265744A1 US11/136,467 US13646705A US2005265744A1 US 20050265744 A1 US20050265744 A1 US 20050265744A1 US 13646705 A US13646705 A US 13646705A US 2005265744 A1 US2005265744 A1 US 2005265744A1
Authority
US
United States
Prior art keywords
user
image forming
forming apparatus
information
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/136,467
Other versions
US7343114B2 (en
Inventor
Hiroya Uruta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ricoh Co Ltd
Original Assignee
Ricoh Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ricoh Co Ltd filed Critical Ricoh Co Ltd
Assigned to RICOH COMPANY, LTD. reassignment RICOH COMPANY, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Uruta, Hiroya
Publication of US20050265744A1 publication Critical patent/US20050265744A1/en
Application granted granted Critical
Publication of US7343114B2 publication Critical patent/US7343114B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/50Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4433Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/444Restricting access, e.g. according to user identity to a particular document or image or part thereof
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G2215/00Apparatus for electrophotographic processes
    • G03G2215/00025Machine control, e.g. regulating different parts of the machine
    • G03G2215/00126Multi-job machines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0094Multifunctional device, i.e. a device capable of all of reading, reproducing, copying, facsimile transception, file transception

Definitions

  • the present invention generally relates to electronic image forming and, more particularly, to controlling user verification and authorization processes of an image forming apparatus.
  • security settings for network printing devices are controlled by a managing user, who possesses an administrative authority higher than other users. Specifically, users other than the manager are not authorized to adjust the settings or operations of image forming devices related to the access of stored data.
  • JP '047 describes a feature in which confidential print data is protected even after a cancellation of a current print job is requested. In particular, if the cancellation of a print request for confidential print data is requested, the stored print data will only be deleted in the image forming apparatus if a password corresponding to the print requester is entered.
  • JP '343 Japanese Publication No. 2003-058343
  • the image forming device manages the use of the device based on user identification information attached to print job requests, for example, by counting a quantity of use and a use time associated with the user identification information.
  • a server of the network is capable of generating user identification information and of forwarding the print job to the image forming device with the user identification information.
  • JP '328 describes a method for handling a paper jam in a printer.
  • the printer described in JP '328 allows a user to modify a sheet size and a paper discharging direction for a specific print job as a back-up proceeding.
  • the stored print data which may include confidential information, is not deleted when a paper jam occurs, but rather can be used to create a printed document of a size and discharge direction different from the originally-requested size and discharge direction.
  • each of the image forming apparatuses described in these publications operates pursuant to a security policy determined by a manager in situations concerning the confidentiality of data and the management of various kinds of information.
  • the management of global settings for a particular device, such as a security policy cannot be performed by a general, non-manager user, who has lower administrative privileges than the manager. Because these systems depend on a manager to control various basic settings and processing operations, many functions associated with image forming devices become complicated, as general users are not able to adjust such functions on their own.
  • JP '047 describes a security method relating to the cancellation of a print job for a confidential document, and relating to user certification in a document unit.
  • JP '047 does not provide for deletion or resetting of all processing, including printing execution, in a device.
  • JP '343 describes executing a verification setting to attach to a print job that occurs when an image forming device accepts the print job.
  • verification processing is performed for every print job in the system described in JP '343, verification related to an operation of the image forming device or to management of the image forming device is not described.
  • JP '328 describes the storing of confidential data in a device even when a paper jam occurs.
  • JP '328 managing a document output and save operations in an appropriate manner is not described. Also, JP '343 and JP '328 describe verification processes that are based on print job data. In these processes, it is necessary to request verification information from a user for each separate operation that the user requests.
  • An object of the present invention is to provide a verification process based on user information, instead of on print job data. In this way, the confidentiality of data in an image forming apparatus is maintained while reducing the burden of needing to demand an appropriate verification for every processing operation requested by users.
  • This novel capability is performed by verifying a level of authority, for a general user or for a manager user, in the image forming apparatus itself.
  • an image forming apparatus including a communication interface configured to couple to a network, and a printing unit configured to process print data received via the communication interface. Also provided is a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users.
  • the image forming apparatus further includes a managing unit configured to determine if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information.
  • the managing unit is also configured to manage a verification process for the plurality of users based on the corresponding hierarchy information.
  • a method for controlling an image forming apparatus includes receiving print data via a communication interface of the image forming apparatus and generating a printed document based on the print data. Also provided is the step of registering a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users. The method further includes determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and managing a verification process of the image forming apparatus for the plurality of users based on the corresponding hierarchy information.
  • an image forming apparatus including a communication interface configured to couple to a network, and a printing unit configured to process print data received via the communication interface. Also provided is a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users.
  • the image forming apparatus further includes means for managing the image forming apparatus. The means for managing includes means for determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and means for managing a verification process for the plurality of users based on the corresponding hierarchy information.
  • FIG. 1 is a schematic diagram illustrating a network system including an image forming apparatus in accordance the present invention
  • FIG. 2 is a two-part diagram illustrating (a) a representation of an operation panel display and (b) a login display of the image forming apparatus of FIG. 1 ;
  • FIG. 3 is a two-part diagram illustrating (a) a representation of the operating panel display and (2) a default setting display after a “printer default setting” key is pushed down;
  • FIG. 4 is a two-part diagram illustrating (a) a representation of the operation panel display and (2) a default setting display after a “system default setting” key is pushed down;
  • FIGS. 5A and 5B is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with a first embodiment of the present invention
  • FIG. 6 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 after an operation panel key is selected;
  • FIG. 7 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 to determine if a requested operation is permitted based on user authority information;
  • FIG. 8 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with a second embodiment of the present invention
  • FIG. 9 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 after an operation panel key is selected in accordance with the second embodiment of the present invention.
  • FIG. 10 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a third embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 11 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the third embodiment of the present invention.
  • FIG. 12 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a fourth embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 13 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the fourth embodiment of the present invention.
  • FIG. 14 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a fifth embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 15 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the fifth embodiment of the present invention.
  • FIG. 16 includes FIGS. 16A and 16B , which form a sequence chart illustrating another example of an operating procedure in accordance with the fifth embodiment of the present invention.
  • FIG. 17 is a two-part diagram representing a sixth embodiment of the present invention, illustrating (a) a display of a system default setting and (b) a display of a job reset authorization setting;
  • FIG. 18 includes FIGS. 18A and 18B , which form a user authority table in accordance with the present invention.
  • an image forming apparatus 1 is shown as a multi-function printer (MFP), which includes the capabilities of a desktop printer, a copier, a fax machine, and a scanner.
  • MFP multi-function printer
  • the image forming apparatus 1 can be arranged to perform as only some of the above-listed devices or can perform other additional electronic functions useful in office settings. Further, the range of applications and software modules shown in FIG. 1 can be greater or less than that which is represented in the MFP 1 .
  • the MFP 1 includes a hardware interface 7 configured to receive and send data, and an operation panel 10 for allowing a user to input commands into the MFP 1 .
  • the MFP 1 also includes a management unit, shown as CPU 17 in FIG. 1 , that runs an operating system supporting function modules of the following control services: network control service (NSC) 3 , use information control service (UCS) 4 , system control service (SCS) 5 , and operation panel control service (OCS) 6 .
  • NSC network control service
  • UCS use information control service
  • SCS system control service
  • OCS operation panel control service
  • Each of the function modules 3 - 6 operates to control a connected hardware resource, manage setting information, or control a displaying window.
  • the operating system of the CPU 17 also supports an application program interface (API) and multiple application functions 2 , including the functions of a printer, a copier, a facsimile machine, and a scanner.
  • API application program interface
  • the copier and scanner application functions are used to control a scanning unit of the MFP 1 that is configured to optically scan a document.
  • the MFP 1 also includes a facsimile unit that is controlled by the facsimile application function to transmit and receive information via facsimile communication.
  • Data sent from one of host computers 12 - 16 is transmitted via the interface 7 to the MFP 1 through a network line 11 .
  • the input data is processed by the NCS 3 , which is coupled to the interface 7 , and is sent to one of the other control services 4 - 6 , or to one of the applications 2 .
  • Data can also be inputted to the MFP 1 via the operation panel 10 , and such input data is processed by the OCS 6 , which is coupled to the operation panel 10 . The data is subsequently sent to one of the other control services 4 - 6 , or to one of the applications 2 .
  • the UCS 4 receives data including user information sent from the NCS 3 or the OCS 6 and registers this data in a memory area in the MFP 1 including an address book 8 , which is coupled to the UCS 4 . Furthermore, the UCS 4 executes a verification process for determining a verification of a user's identity based on, for example, login processing.
  • the SCS 5 manages a basic setting memory area 9 that relates to operation of the whole system of the MFP 1 .
  • the host computers 12 - 16 and the operation panel 10 can include touchscreen displays to display the various operating displays hereinafter described or can include non-touchscreen displays that require the use of an additional user interface device (e.g., a keyboard) to activate the virtual buttons or keys of the various displays.
  • an additional user interface device e.g., a keyboard
  • selecting a key of one of the displays can be performed by applying pressure to a corresponding portion of a touchscreen, or by positioning a pointer icon over the key and pressing a button on a user interface device coupled to the device.
  • a user A without authority of a manager and a user B with authority of a manager are both preliminarily registered in the address book 8 by the UCS 4 in response to data inputted from the interface 7 or from the operation panel 10 .
  • Part (a) of FIG. 2 shows an example of an operation panel display 20 that is shown on the operation panel 10 .
  • the operation panel display 20 can also be shown on the displays of the host computers 12 - 16 for remote control and management of the MFP 1 .
  • Part (b) of FIG. 2 shows a login display 24 that is displayed when the “login” key 21 of the operation panel display 20 is selected.
  • Part (a) of FIG. 3 shows the operating panel display 20 after user A has logged in.
  • Part (b) of FIG. 3 illustrates a printer default setting window 27 after the “printer default setting” key 22 on the operating panel display 20 is selected.
  • Part (a) of FIG. 4 shows the operation panel display 20
  • part (b) of FIG. 4 illustrates a system default setting window 24 after the “system default setting” key 23 on the operating panel display 20 is selected.
  • FIGS. 5 and 6 both illustrate processes performed in accordance with a first embodiment of the present invention. Each processing operation of the first embodiment of the present invention is explained based on FIG. 6 with reference to FIGS. 1-5 .
  • FIG. 5 illustrates a user registration process sequence for the MFP 1 , in which user information, including authorization or hierarchy information, for users A and B is registered into the address book 8 .
  • the host computers 12 - 16 and the operation panel 10 can all be used as registration units for registering user information.
  • user information for user A is registered from the host computer 12 through the network 11 and is passed through the NCS 3 and the UCS 4 to the address book 8 .
  • the user B is registered from the operation panel 10 , and the user information of user B is transferred to address book 8 via the OCS 6 , the SCS 5 , and the UCS 4 .
  • the OCS 6 transmits a signal to a target function module, which is one of the control services 3 - 5 or one of the applications 2 corresponding to the selected key (step S 2 ).
  • the target function module refers to the UCS 4 (step S 3 ), which determines if the requested operation corresponding to the selected key should be permitted based on user authority (step S 4 ).
  • the UCS 4 refers to a user authority table ( FIG. 18 ), which indicates the operations that are available to each type of user that uses the MFP 1 .
  • the function module then receives the authorization indication from the UCS 4 and determines if the requested operation should be permitted or not (step S 5 ). If the operation is permitted (“Yes” in response to decision step S 5 ), the function module activates the appropriate subsequent display on the operation panel 10 (step S 6 ).
  • FIG. 18 illustrates the user authority table, to which the UCS 4 refers in response to a request from another control service in step S 3 in FIG. 6 .
  • the user authority table is stored in the address book 8 and indicates which operations of the MFP 1 are executable or not executable based on the type of user that is logged into the MFP 1 .
  • the adjustment of “buzzer sound” in the “basic setting” category is executable by a user manager, but is not executable by a general user, who does not have manager-level authorization.
  • FIG. 7 is a flow chart illustrating the process steps performed by the UCS 4 in making an authorization determination.
  • the UCS 4 receives a reference request from another function module (in process step S 3 of FIG. 6 ) to determine if a current, logged-in user is authorized to request a particular operation (step S 11 ).
  • the UCS 4 accepts information relating to the pressing of the corresponding key on the operation panel display 20 (step S 12 ).
  • the authority information corresponding to the current user stored inside the UCS 4 is then read out (step S 113 ), as is one of the key items from the user authority table shown FIG. 18 (step S 14 ).
  • the UCS 4 determines if the retrieved key item corresponds to selected key (step S 15 ).
  • step S 15 If there is no correspondence (“No” in response to decision step S 15 ), the process returns to step S 14 to read out the next key item in the user authority table. If a correspondence exists (“Yes” in response to decision step S 15 ), the UCS 4 then determines if the requested operation is executable or not executable, based on the authority of the current user and the information in the user authority table (step S 16 ). The result of determining user authorization with respect to the requested operation is then transmitted to the requesting function module (step S 17 ).
  • the authorization determination is performed by the process explained above with respect to steps S 1 -S 5 of FIG. 6 . Further, in process step S 6 , the login window 24 is displayed. A user name of the user A is input into an input area 25 , and a password of user A is input into a password input area 26 of the login window 24 . This verification information is stored in a memory of the MFP 1 , and user A is thus logged into the MFP 1 .
  • the authorization determination is performed by the UCS 4 by comparing user information of user A with authority information stored in the address book 8 .
  • the appropriate user name and login state are displayed in the operation panel window 20 and a state of login is also indicated.
  • the “login” key 21 can be changed to display the term “log-out,” as shown in FIG. 4 .
  • a processing sequence of a printer default setting is explained below, with user A being logged into the MFP 1 .
  • the process steps S 1 -S 5 shown in FIG. 6 are performed. Specifically, the pressing of the “printer default setting” key 22 results in a corresponding signal being sent from the OCS 6 to the SCS 5 , which requests an authorization determination from the UCS 4 regarding the requested operation.
  • the printer default setting window 27 is displayed (step S 6 ), and the MFP 1 awaits further input instructions from user A. For example, at the end of the “printer default setting” operation, user A can press the “END” key 28 .
  • the SCS controls the operation panel 10 to again display the operation panel window 20 .
  • the processing sequence of a “system default setting” request is explained below, with user A being logged into the MFP 1 .
  • the MFP 1 determines if user A is authorized to request such an operation (step S 5 in FIG. 6 ). Because a “system default setting” operation is only executable for a user with manager-level authority (e.g., user manager, network manager, etc.), as indicated in FIG. 18 , the operation is not executable for the user A (“No” in response to step S 5 ).
  • the MFP 1 then confirms that user A is logged-in (step S 7 ).
  • step S 7 When it is confirmed that user A is a user without authority of a manager (“Yes” in response to decision step S 7 ), a cancellation request of the log-in of user A is sent to the UCS 4 and the user verification for user A is canceled (step S 8 ).
  • the login display 24 shown in FIG. 4 is again displayed. Further, in the process step S 7 , if user A is not logged-in (“No” in response to decision step S 7 ), the login display 24 is displayed.
  • a name of user B who has authority of a manager, is entered into the user name input area 25 and a corresponding password is entered into the password input area 26 .
  • the login process as described above, is performed for user B (step S 10 ) and, afterwards, the process advances to step S 3 of FIG. 6 to again determine if the “system default setting” operation is executable for the current user, in this case user B. Because user B has manager-level authority, the operation is executable, as determined in steps S 3 -S 5 .
  • the window 24 shown in FIG. 4 is then displayed (step S 6 ), and the MFP 1 then awaits further requests from user B.
  • the MFP 1 can perform an authorization determination for every operation request based on user authorization information. Consequently, a burden of a verification can be reduced by providing an image forming apparatus, such as the MFP 1 , with the capability to request appropriate verifications of users demanding particular operations. Because the image forming apparatus includes a management unit configured to manage login processing of multiple users and the operability of the apparatus with respect to users of different authority or hierarchy, the apparatus can be used without a user being conscious of authorization processing. Also, the confidentiality of data stored in the image forming apparatus is maintained, as only users with the proper level of authority can access the data.
  • FIGS. 8 and 9 illustrate a processing sequence performed by the MFP 1 in accordance with a second embodiment of the present invention, which uses the same basic structure of the MFP 1 in FIG. 1 .
  • the requesting of a “system default setting” operation is explained below in accordance with the second embodiment of the present invention.
  • the current user is user A, who does not have manager authority.
  • Steps S 21 -S 25 of FIG. 9 are similar to steps S 1 -S 5 of FIG. 6 .
  • a key is selected on the operation panel window 20 displayed in the operation panel 10 (step S 21 ), and the OCS 6 transmits a signal corresponding to the key click to a target function module, i.e., control service or application (step S 22 ).
  • the target function module requests that the UCS 4 determine if the requested operation is executable (step S 23 ).
  • the UCS 4 refers to the user authority table of FIG. 18 to determine if the logged-in user has the proper authority level to execute the requested operation (step S 24 ).
  • the function module receives the authorization result from the UCS 4 and determines if the requested operation should be executed (step S 25 ).
  • the “system default setting” key 23 of the operation panel 20 shown in FIG. 4 When the “system default setting” key 23 of the operation panel 20 shown in FIG. 4 is selected, the authority level of the logged-in user is checked by the UCS 4 to determine if this operation is executable. In this example, because user A does not have the authority of a manager, execution of the “system default setting” operation is not possible (“No” in response to decision step S 25 ). In accordance with the second embodiment of the present invention, the login window 24 shown in FIG. 4 is then displayed (step S 29 ).
  • step S 30 the user B, who has the authority of a manager, inputs a user name into the input area 25 and a password input into the password input area 26 ; login of user B is then performed by storing the verification information of user B in the MFP 1 (step S 30 ). After the process step S 30 is performed, step S 3 is again performed to determine if the requested “system default setting” operation can be executed. Because user B has the authority of a manager, the UCS 4 determines that the operation is executable (“Yes” in response to decision step S 25 ), and the management unit determines if the previous user, user A, is still logged-in (step S 26 ).
  • step S 27 if user A is still logged-in (“Yes” in response to decision step S 26 ), then user A is automatically logged-out from the MFP 1 (step S 27 ).
  • a “system default setting” operation window (similar to the printer default setting window 27 in FIG. 3 ) is displayed (step S 28 ). From this window, the process can be executed based on instructions from the manager-level user B.
  • FIG. 10 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) and a display corresponding to the selection of an “all job” reset request.
  • FIG. 11 is a sequence chart illustrating processes performed in accordance with the third embodiment of the present invention.
  • user A is logged into the MFP 1 via the operational panel 10 and the OCS 6 .
  • the default window 30 shown in FIG. 10 is displayed on the operation panel 10 .
  • a job abort window 32 is displayed, as shown in part (b) of FIG. 10 .
  • the job abort window 32 includes the following selectable keys: a “printing job” key 33 , an “all job” key 34 , and a “continue printing” key 35 .
  • the MFP 1 executes the corresponding operation without checking the authorization level of the current user, because the current user already has the authorization to control the specific pending job.
  • the “all job” operation may relate to jobs not requested by the current user, and thus when the “all job” key 34 is selected from the job abort window 32 , a verification of whether the current user can successfully request execution of this operation is performed by the UCS 4 .
  • the UCS 4 determines if the “all job” operation is executable in view of the authorization level of the current user (step S 23 in FIG. 9 ). Because user A does not have manager-level authorization, the “all job” operation is not executable, and the login window 24 is displayed to request verification of a new user with the authority of a manager. When a verification of user B is entered into the login window 24 (“login (user B) process sequence” in FIG. 11B ) and is confirmed by the MFP 1 , the UCS 4 once again verifies if the “all job” process can be executed.
  • the UCS 4 When the “all job” operation is judged by the UCS 4 to be executable, the previously-logged-in user, user A, is logged-out (“cancel of last login” in FIG. 11B ) and an “all job abort” window (similar to the “print job abort window” 36 ) is displayed. The MFP 1 then waits for further instructions from the user B.
  • the management unit of the image forming apparatus stores a verification of the general user until a manager user is logged-in. If a manager user does not log into the image forming apparatus, the operation of the apparatus continues with the general user being the current user, and the second verification operation is canceled.
  • FIG. 12 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request.
  • FIG. 13 is a sequence chart illustrating processes performed during operation of the MFP 1 in accordance with the fourth embodiment of the present invention.
  • a job abort window 32 is displayed.
  • the print job abort window 36 is subsequently displayed, and user A can execute the operation.
  • a manager user is able to temporarily log into the image forming apparatus to execute a particular operation that requires manager-level authorization. This method does not cancel the verification of the previously-logged-in user, who is a non-manager. In this way, the present invention provides for execution of an operation without logging-out the previous, non-manager user and by allowing a temporary verification by a manager user.
  • FIG. 14 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request.
  • FIG. 15 is a sequence chart illustrating processes performed during operation of the MFP 1 in accordance with the fifth embodiment of the present invention.
  • a one shot verification window 37 is displayed.
  • each process that requires a one-shot verification by a manager-level user in order to be executable is performed only once by the MFP 1 .
  • the job abort window 32 is displayed. If the “printing document” key 33 is pushed down, the one shot verification window 37 is displayed. When a user name of user A, who is a non-manager user, is entered in the input area 38 and a corresponding password is entered in the input area 39 , the verification is confirmed and a window similar to the print job abort window 36 shown in FIG. 10 is displayed.
  • the display of the operation panel 10 reverts back to the job abort window 32 .
  • the UCS 4 determines if the “all job” process is executable. Because user A does not have manager-level authority, the one shot verification window 37 is displayed again, and a verification of user A is then canceled.
  • FIG. 16 illustrates an alternative process sequence of the fifth embodiment of the present invention.
  • the UCS 4 determines that the operation cannot be executed because user A is not a manager (“operation impossible” in FIG. 16B ).
  • the one shot verification window 37 ( FIG. 14 ) is then displayed.
  • user A is logged-out only after verification from user B is confirmed via the one shot verification window 37 .
  • FIG. 17 illustrates (a) a display of a system default setting and (b) a display of a job reset authorization setting.
  • a manager user is capable of successfully requesting an “all job” reset operation.
  • an adaptive range of users who are permitted to request an “all job” reset operation can be modified by a manager. With this capability, even general users may be permitted to request an “all job” reset operation.
  • Part (a) of FIG. 17 illustrates a system default setting window 50 that is displayed on the operation panel 10 and that allows modification of the adaptive range of users that can request an “all job” reset operation.
  • a login process is first executed by user B, who is a manager, from the operation panel display 20 shown in FIG. 4 .
  • the “system default setting” key 23 is pushed down, the system default setting window 50 shown in FIG. 17 is displayed.
  • the window shifts to the job reset permission setting window 52 shown in FIG. 17 .
  • the “all user” key 53 is selected by user B, the corresponding operation is executed. Consequently, all types of logged-in users, including non-manager users, can successfully request an “all job” reset operation.
  • the “no verification” key 54 in the job reset permission setting window 52 of FIG. 17 user B can allow all users of the MFP 1 to request an “all job” reset even if they are not logged-into the MFP 1 .
  • the MFP 1 when the MFP 1 is in a service maintenance mode, in which repairs and adjustments of the apparatus are made, all maintenance functions are given priority. In this special mode, service personnel are allowed to operate all aspects of the MFP 1 , including job reset operations, after entering a pre-determined code or sequence of key selections (e.g., a number combination via the operation panel 10 ) instead of logging in via a display window.
  • a pre-determined code or sequence of key selections e.g., a number combination via the operation panel 10
  • the apparatus allows a manager to select a range of permitted users for an “all job” reset operation to be (1) all users with login verification, (2) or all users, verified or unverified.
  • the sixth embodiment of the present invention provides for a special maintenance mode to allow service personnel to gain control of the MFP 1 without going through a normal login process (e.g., requiring a user name and password).
  • the job reset permission setting window 52 can be used to register or modify the user identifications and passwords for each manager and general user.
  • the various aspects of the present invention provide for an image forming apparatus that can determine the authorization levels of users. Because the confidentiality of stored data is maintained and an appropriate verification is demanded for each user requesting an operation, the burden for verification can be reduced. Also, the image forming apparatus of the present invention is useful for using print managing information to maintain a confidentiality of the print data.

Abstract

An image forming apparatus including a communication interface configured to couple to a network, and a printing unit configured to process print data received via the communication interface. Also provided is a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users. The image forming apparatus further includes a managing unit configured to determine if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information. The managing unit is also configured to manage a verification process for the plurality of users based on the corresponding hierarchy information.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention generally relates to electronic image forming and, more particularly, to controlling user verification and authorization processes of an image forming apparatus.
  • 2. Description of the Background Art
  • In network systems, the exchange of data among connected devices has become relatively simple, due to technological advances that continue to be increasingly efficient and affordable. Of course, among the transmitted data is information of a confidential nature, and such protected data is sent to and received by various types of electronic devices, including image forming devices such as office printers. Because image forming devices often have the capability of temporarily storing inputted information to be printed, including confidential data, it is necessary to prevent unauthorized users from gaining control of the devices to access the protected information. For example, the ability to input an instruction to an image forming device may be limited to prevent an information leak.
  • In present systems, security settings for network printing devices are controlled by a managing user, who possesses an administrative authority higher than other users. Specifically, users other than the manager are not authorized to adjust the settings or operations of image forming devices related to the access of stored data.
  • Japanese Publication No. 2003-226047 (JP '047), the entire contents of which are hereby incorporated herein by reference, describes a network system including an image forming apparatus that is shared by multiple users. The image forming apparatus is provided with a confidential printing function that prevents unauthorized users from accessing confidential information to be printed. Specifically, JP '047 describes a feature in which confidential print data is protected even after a cancellation of a current print job is requested. In particular, if the cancellation of a print request for confidential print data is requested, the stored print data will only be deleted in the image forming apparatus if a password corresponding to the print requester is entered.
  • Further, Japanese Publication No. 2003-058343 (JP '343), the entire contents of which are hereby incorporated herein by reference, describes an image forming device that receives and processes a request from a client device through a network. The image forming device manages the use of the device based on user identification information attached to print job requests, for example, by counting a quantity of use and a use time associated with the user identification information. In the system described in JP '343, even if a print job is sent via the network to the image forming device by a registered user, but without attached user identification information, a server of the network is capable of generating user identification information and of forwarding the print job to the image forming device with the user identification information.
  • Moreover, Japanese Publication No. 2001-0328328 (JP '328), the entire contents of which are hereby incorporated herein by reference, describes a method for handling a paper jam in a printer. Specifically, in the event of a paper jam, the printer described in JP '328 allows a user to modify a sheet size and a paper discharging direction for a specific print job as a back-up proceeding. In this way, the stored print data, which may include confidential information, is not deleted when a paper jam occurs, but rather can be used to create a printed document of a size and discharge direction different from the originally-requested size and discharge direction.
  • However, each of the image forming apparatuses described in these publications operates pursuant to a security policy determined by a manager in situations concerning the confidentiality of data and the management of various kinds of information. The management of global settings for a particular device, such as a security policy, cannot be performed by a general, non-manager user, who has lower administrative privileges than the manager. Because these systems depend on a manager to control various basic settings and processing operations, many functions associated with image forming devices become complicated, as general users are not able to adjust such functions on their own.
  • For example, JP '047 describes a security method relating to the cancellation of a print job for a confidential document, and relating to user certification in a document unit. However, JP '047 does not provide for deletion or resetting of all processing, including printing execution, in a device. Furthermore, JP '343 describes executing a verification setting to attach to a print job that occurs when an image forming device accepts the print job. However, while verification processing is performed for every print job in the system described in JP '343, verification related to an operation of the image forming device or to management of the image forming device is not described. Furthermore, JP '328 describes the storing of confidential data in a device even when a paper jam occurs. However, in JP '328, managing a document output and save operations in an appropriate manner is not described. Also, JP '343 and JP '328 describe verification processes that are based on print job data. In these processes, it is necessary to request verification information from a user for each separate operation that the user requests.
  • SUMMARY OF THE INVENTION
  • An object of the present invention is to provide a verification process based on user information, instead of on print job data. In this way, the confidentiality of data in an image forming apparatus is maintained while reducing the burden of needing to demand an appropriate verification for every processing operation requested by users. This novel capability is performed by verifying a level of authority, for a general user or for a manager user, in the image forming apparatus itself.
  • In accordance with one aspect of the present invention, an image forming apparatus is provided, including a communication interface configured to couple to a network, and a printing unit configured to process print data received via the communication interface. Also provided is a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users. The image forming apparatus further includes a managing unit configured to determine if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information. The managing unit is also configured to manage a verification process for the plurality of users based on the corresponding hierarchy information.
  • In accordance with another aspect of the present invention, a method for controlling an image forming apparatus is provided. The method includes receiving print data via a communication interface of the image forming apparatus and generating a printed document based on the print data. Also provided is the step of registering a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users. The method further includes determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and managing a verification process of the image forming apparatus for the plurality of users based on the corresponding hierarchy information.
  • In accordance with a further aspect of the present invention, an image forming apparatus is provided, including a communication interface configured to couple to a network, and a printing unit configured to process print data received via the communication interface. Also provided is a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users. The image forming apparatus further includes means for managing the image forming apparatus. The means for managing includes means for determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and means for managing a verification process for the plurality of users based on the corresponding hierarchy information.
  • These and other objects, features, and advantages of the present invention will become apparent upon consideration of the following description of the preferred embodiments of the present invention, taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A more complete appreciation of the present invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings.
  • FIG. 1 is a schematic diagram illustrating a network system including an image forming apparatus in accordance the present invention;
  • FIG. 2 is a two-part diagram illustrating (a) a representation of an operation panel display and (b) a login display of the image forming apparatus of FIG. 1;
  • FIG. 3 is a two-part diagram illustrating (a) a representation of the operating panel display and (2) a default setting display after a “printer default setting” key is pushed down;
  • FIG. 4 is a two-part diagram illustrating (a) a representation of the operation panel display and (2) a default setting display after a “system default setting” key is pushed down;
  • FIGS. 5A and 5B is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with a first embodiment of the present invention;
  • FIG. 6 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 after an operation panel key is selected;
  • FIG. 7 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 to determine if a requested operation is permitted based on user authority information;
  • FIG. 8 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with a second embodiment of the present invention;
  • FIG. 9 is a flow chart illustrating an operating procedure performed in the image forming apparatus of FIG. 1 after an operation panel key is selected in accordance with the second embodiment of the present invention.
  • FIG. 10 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a third embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 11 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the third embodiment of the present invention;
  • FIG. 12 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a fourth embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 13 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the fourth embodiment of the present invention;
  • FIG. 14 is a four-part diagram illustrating (a) a default display during a job operation in accordance with a fifth embodiment of the present invention, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request;
  • FIG. 15 is a sequence chart illustrating processes performed during operation of the image forming apparatus of FIG. 1 in accordance with the fifth embodiment of the present invention;
  • FIG. 16 includes FIGS. 16A and 16B, which form a sequence chart illustrating another example of an operating procedure in accordance with the fifth embodiment of the present invention;
  • FIG. 17 is a two-part diagram representing a sixth embodiment of the present invention, illustrating (a) a display of a system default setting and (b) a display of a job reset authorization setting; and
  • FIG. 18 includes FIGS. 18A and 18B, which form a user authority table in accordance with the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, non-limiting embodiments of the present invention are described. In describing preferred embodiments illustrated in the drawings, specific terminology is employed for the sake of clarity. However, the disclosure of this patent specification is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner.
  • In FIG. 1, an image forming apparatus 1 is shown as a multi-function printer (MFP), which includes the capabilities of a desktop printer, a copier, a fax machine, and a scanner. Alternatively, the image forming apparatus 1 can be arranged to perform as only some of the above-listed devices or can perform other additional electronic functions useful in office settings. Further, the range of applications and software modules shown in FIG. 1 can be greater or less than that which is represented in the MFP 1.
  • The MFP 1 includes a hardware interface 7 configured to receive and send data, and an operation panel 10 for allowing a user to input commands into the MFP 1. The MFP 1 also includes a management unit, shown as CPU 17 in FIG. 1, that runs an operating system supporting function modules of the following control services: network control service (NSC) 3, use information control service (UCS) 4, system control service (SCS) 5, and operation panel control service (OCS) 6. Each of the function modules 3-6 operates to control a connected hardware resource, manage setting information, or control a displaying window. The operating system of the CPU 17 also supports an application program interface (API) and multiple application functions 2, including the functions of a printer, a copier, a facsimile machine, and a scanner. The copier and scanner application functions are used to control a scanning unit of the MFP 1 that is configured to optically scan a document. The MFP 1 also includes a facsimile unit that is controlled by the facsimile application function to transmit and receive information via facsimile communication.
  • Data sent from one of host computers 12-16 is transmitted via the interface 7 to the MFP 1 through a network line 11. The input data is processed by the NCS 3, which is coupled to the interface 7, and is sent to one of the other control services 4-6, or to one of the applications 2.
  • Data can also be inputted to the MFP 1 via the operation panel 10, and such input data is processed by the OCS 6, which is coupled to the operation panel 10. The data is subsequently sent to one of the other control services 4-6, or to one of the applications 2.
  • The UCS 4 receives data including user information sent from the NCS 3 or the OCS 6 and registers this data in a memory area in the MFP 1 including an address book 8, which is coupled to the UCS 4. Furthermore, the UCS 4 executes a verification process for determining a verification of a user's identity based on, for example, login processing. The SCS 5 manages a basic setting memory area 9 that relates to operation of the whole system of the MFP 1.
  • The host computers 12-16 and the operation panel 10 can include touchscreen displays to display the various operating displays hereinafter described or can include non-touchscreen displays that require the use of an additional user interface device (e.g., a keyboard) to activate the virtual buttons or keys of the various displays. Thus, depending on the particular configuration of the host computers 12-16 and of the operation panel 10, selecting a key of one of the displays can be performed by applying pressure to a corresponding portion of a touchscreen, or by positioning a pointer icon over the key and pressing a button on a user interface device coupled to the device.
  • In one example of using the MFP 1, a user A without authority of a manager and a user B with authority of a manager are both preliminarily registered in the address book 8 by the UCS 4 in response to data inputted from the interface 7 or from the operation panel 10. Part (a) of FIG. 2 shows an example of an operation panel display 20 that is shown on the operation panel 10. The operation panel display 20 can also be shown on the displays of the host computers 12-16 for remote control and management of the MFP 1. Part (b) of FIG. 2 shows a login display 24 that is displayed when the “login” key 21 of the operation panel display 20 is selected.
  • Part (a) of FIG. 3 shows the operating panel display 20 after user A has logged in. Part (b) of FIG. 3 illustrates a printer default setting window 27 after the “printer default setting” key 22 on the operating panel display 20 is selected. Part (a) of FIG. 4 shows the operation panel display 20, and part (b) of FIG. 4 illustrates a system default setting window 24 after the “system default setting” key 23 on the operating panel display 20 is selected.
  • FIGS. 5 and 6 both illustrate processes performed in accordance with a first embodiment of the present invention. Each processing operation of the first embodiment of the present invention is explained based on FIG. 6 with reference to FIGS. 1-5.
  • FIG. 5 illustrates a user registration process sequence for the MFP 1, in which user information, including authorization or hierarchy information, for users A and B is registered into the address book 8. The host computers 12-16 and the operation panel 10 can all be used as registration units for registering user information. In the illustrated example, user information for user A is registered from the host computer 12 through the network 11 and is passed through the NCS 3 and the UCS 4 to the address book 8. In contrast, the user B is registered from the operation panel 10, and the user information of user B is transferred to address book 8 via the OCS 6, the SCS 5, and the UCS 4.
  • An exemplary operation of the MFP 1 by the user A, who does not have the authority of a manager, is now described.
  • As shown in FIG. 6, in response to a pressing of a key on the operation panel window 20 displayed on the operation panel 10 (step S1), the OCS 6 transmits a signal to a target function module, which is one of the control services 3-5 or one of the applications 2 corresponding to the selected key (step S2). The target function module refers to the UCS 4 (step S3), which determines if the requested operation corresponding to the selected key should be permitted based on user authority (step S4). In making such a determination, as described in more detail below, the UCS 4 refers to a user authority table (FIG. 18), which indicates the operations that are available to each type of user that uses the MFP 1. The function module then receives the authorization indication from the UCS 4 and determines if the requested operation should be permitted or not (step S5). If the operation is permitted (“Yes” in response to decision step S5), the function module activates the appropriate subsequent display on the operation panel 10 (step S6).
  • FIG. 18 illustrates the user authority table, to which the UCS 4 refers in response to a request from another control service in step S3 in FIG. 6. The user authority table is stored in the address book 8 and indicates which operations of the MFP 1 are executable or not executable based on the type of user that is logged into the MFP 1. For example, referring to FIG. 18, the adjustment of “buzzer sound” in the “basic setting” category is executable by a user manager, but is not executable by a general user, who does not have manager-level authorization.
  • FIG. 7 is a flow chart illustrating the process steps performed by the UCS 4 in making an authorization determination. Initially, the UCS 4 receives a reference request from another function module (in process step S3 of FIG. 6) to determine if a current, logged-in user is authorized to request a particular operation (step S11). The UCS 4 then accepts information relating to the pressing of the corresponding key on the operation panel display 20 (step S12). The authority information corresponding to the current user stored inside the UCS 4 is then read out (step S113), as is one of the key items from the user authority table shown FIG. 18 (step S14). The UCS 4 then determines if the retrieved key item corresponds to selected key (step S15). If there is no correspondence (“No” in response to decision step S15), the process returns to step S14 to read out the next key item in the user authority table. If a correspondence exists (“Yes” in response to decision step S15), the UCS 4 then determines if the requested operation is executable or not executable, based on the authority of the current user and the information in the user authority table (step S16). The result of determining user authorization with respect to the requested operation is then transmitted to the requesting function module (step S17).
  • Referring to FIG. 2 and to the login process sequence illustrated in FIG. 5, when the “login” key 21 of the operation panel window 20 is pushed down, the authorization determination is performed by the process explained above with respect to steps S1-S5 of FIG. 6. Further, in process step S6, the login window 24 is displayed. A user name of the user A is input into an input area 25, and a password of user A is input into a password input area 26 of the login window 24. This verification information is stored in a memory of the MFP 1, and user A is thus logged into the MFP 1.
  • In the login process, the authorization determination is performed by the UCS 4 by comparing user information of user A with authority information stored in the address book 8. As shown in FIG. 3, when login of user A is permitted and is successful, the appropriate user name and login state are displayed in the operation panel window 20 and a state of login is also indicated. Alternatively to the example shown in FIG. 3, the “login” key 21 can be changed to display the term “log-out,” as shown in FIG. 4.
  • A processing sequence of a printer default setting is explained below, with user A being logged into the MFP 1. Referring to FIG. 3, when user A presses the “printer default setting” key 22 in the operation panel window 20 on the operation panel 10, the process steps S1-S5 shown in FIG. 6 are performed. Specifically, the pressing of the “printer default setting” key 22 results in a corresponding signal being sent from the OCS 6 to the SCS 5, which requests an authorization determination from the UCS 4 regarding the requested operation. Because the “printer default setting” operation is executable for user A (“Yes” in response to decision step S5), the printer default setting window 27 is displayed (step S6), and the MFP 1 awaits further input instructions from user A. For example, at the end of the “printer default setting” operation, user A can press the “END” key 28. In response, the SCS controls the operation panel 10 to again display the operation panel window 20.
  • The processing sequence of a “system default setting” request, as shown in FIG. 5B, is explained below, with user A being logged into the MFP 1. When the “system default setting” key 23 of the operation panel display 20 is selected, the MFP 1 determines if user A is authorized to request such an operation (step S5 in FIG. 6). Because a “system default setting” operation is only executable for a user with manager-level authority (e.g., user manager, network manager, etc.), as indicated in FIG. 18, the operation is not executable for the user A (“No” in response to step S5). The MFP 1 then confirms that user A is logged-in (step S7). When it is confirmed that user A is a user without authority of a manager (“Yes” in response to decision step S7), a cancellation request of the log-in of user A is sent to the UCS 4 and the user verification for user A is canceled (step S8).
  • In order to receive and process a login verification by a user with an authority level that can successfully request performance of the operation, the login display 24 shown in FIG. 4 is again displayed. Further, in the process step S7, if user A is not logged-in (“No” in response to decision step S7), the login display 24 is displayed.
  • In the login display 24, a name of user B, who has authority of a manager, is entered into the user name input area 25 and a corresponding password is entered into the password input area 26. The login process, as described above, is performed for user B (step S10) and, afterwards, the process advances to step S3 of FIG. 6 to again determine if the “system default setting” operation is executable for the current user, in this case user B. Because user B has manager-level authority, the operation is executable, as determined in steps S3-S5. The window 24 shown in FIG. 4 is then displayed (step S6), and the MFP 1 then awaits further requests from user B.
  • By the above-described processes, the MFP 1 can perform an authorization determination for every operation request based on user authorization information. Consequently, a burden of a verification can be reduced by providing an image forming apparatus, such as the MFP 1, with the capability to request appropriate verifications of users demanding particular operations. Because the image forming apparatus includes a management unit configured to manage login processing of multiple users and the operability of the apparatus with respect to users of different authority or hierarchy, the apparatus can be used without a user being conscious of authorization processing. Also, the confidentiality of data stored in the image forming apparatus is maintained, as only users with the proper level of authority can access the data.
  • FIGS. 8 and 9 illustrate a processing sequence performed by the MFP 1 in accordance with a second embodiment of the present invention, which uses the same basic structure of the MFP 1 in FIG. 1. The requesting of a “system default setting” operation is explained below in accordance with the second embodiment of the present invention. In this example, the current user is user A, who does not have manager authority.
  • Steps S21-S25 of FIG. 9 are similar to steps S1-S5 of FIG. 6. For example, a key is selected on the operation panel window 20 displayed in the operation panel 10 (step S21), and the OCS 6 transmits a signal corresponding to the key click to a target function module, i.e., control service or application (step S22). The target function module requests that the UCS 4 determine if the requested operation is executable (step S23). As described above, the UCS 4 refers to the user authority table of FIG. 18 to determine if the logged-in user has the proper authority level to execute the requested operation (step S24). The function module then receives the authorization result from the UCS 4 and determines if the requested operation should be executed (step S25).
  • When the “system default setting” key 23 of the operation panel 20 shown in FIG. 4 is selected, the authority level of the logged-in user is checked by the UCS 4 to determine if this operation is executable. In this example, because user A does not have the authority of a manager, execution of the “system default setting” operation is not possible (“No” in response to decision step S25). In accordance with the second embodiment of the present invention, the login window 24 shown in FIG. 4 is then displayed (step S29).
  • In the login window 24, the user B, who has the authority of a manager, inputs a user name into the input area 25 and a password input into the password input area 26; login of user B is then performed by storing the verification information of user B in the MFP 1 (step S30). After the process step S30 is performed, step S3 is again performed to determine if the requested “system default setting” operation can be executed. Because user B has the authority of a manager, the UCS 4 determines that the operation is executable (“Yes” in response to decision step S25), and the management unit determines if the previous user, user A, is still logged-in (step S26). In accordance with the second embodiment of the present invention, if user A is still logged-in (“Yes” in response to decision step S26), then user A is automatically logged-out from the MFP 1 (step S27). When user A is not logged into the MFP 1 at step S26 (“No” in response to decision step S26), a “system default setting” operation window (similar to the printer default setting window 27 in FIG. 3) is displayed (step S28). From this window, the process can be executed based on instructions from the manager-level user B.
  • A third embodiment of the present invention is now described with reference to FIGS. 10 and 11. FIG. 10 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) and a display corresponding to the selection of an “all job” reset request. FIG. 11 is a sequence chart illustrating processes performed in accordance with the third embodiment of the present invention.
  • Referring to the “login (user A) process sequence” shown in FIG. 11A, user A is logged into the MFP 1 via the operational panel 10 and the OCS 6. During execution of a print job by the MFP 1, the default window 30 shown in FIG. 10 is displayed on the operation panel 10.
  • When the “job reset” key 31 is pushed down on the default window 30, a job abort window 32 is displayed, as shown in part (b) of FIG. 10. The job abort window 32 includes the following selectable keys: a “printing job” key 33, an “all job” key 34, and a “continue printing” key 35. When the “printing job” key 33 or the “continue printing” key 35 are selected, the MFP 1 executes the corresponding operation without checking the authorization level of the current user, because the current user already has the authorization to control the specific pending job. However, the “all job” operation may relate to jobs not requested by the current user, and thus when the “all job” key 34 is selected from the job abort window 32, a verification of whether the current user can successfully request execution of this operation is performed by the UCS 4.
  • Specifically, when the “all job” key 34 is selected, the UCS 4 determines if the “all job” operation is executable in view of the authorization level of the current user (step S23 in FIG. 9). Because user A does not have manager-level authorization, the “all job” operation is not executable, and the login window 24 is displayed to request verification of a new user with the authority of a manager. When a verification of user B is entered into the login window 24 (“login (user B) process sequence” in FIG. 11B) and is confirmed by the MFP 1, the UCS 4 once again verifies if the “all job” process can be executed. When the “all job” operation is judged by the UCS 4 to be executable, the previously-logged-in user, user A, is logged-out (“cancel of last login” in FIG. 11B) and an “all job abort” window (similar to the “print job abort window” 36) is displayed. The MFP 1 then waits for further instructions from the user B.
  • In accordance with this embodiment of the present invention, when a general user requests an operation that can only be executed for a manager-level user, the management unit of the image forming apparatus stores a verification of the general user until a manager user is logged-in. If a manager user does not log into the image forming apparatus, the operation of the apparatus continues with the general user being the current user, and the second verification operation is canceled.
  • A fourth embodiment of the present invention is described below with reference to FIGS. 12 and 13. FIG. 12 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request. FIG. 13 is a sequence chart illustrating processes performed during operation of the MFP 1 in accordance with the fourth embodiment of the present invention;
  • Referring to FIG. 12, when the “job reset” key 31 of the default window 30 is selected by logged-in user A, who does not possess authority of a manager, a job abort window 32 is displayed. In the job abort window 32, when the “printing document” key 33 is pushed down in order to reset the current processing job, the print job abort window 36 is subsequently displayed, and user A can execute the operation.
  • On the other hand, when user A presses the “all job” key 34, the one shot verification window 37 is displayed; the deleting of all printing data is not performed in response to the request because user A is not a manager user. When a user name of user B, who has manager-level authority, is entered in the input area 38 and a corresponding password is entered in the input area 39, the verification is confirmed and the “all job” reset can be processed after the display of an all job reset verification window (see FIG. 13). After the “all job” reset process by user B is executed, user B is logged-out, and the MFP 1 once again reverts to control by user A, who was previously logged-in.
  • In this embodiment, a manager user is able to temporarily log into the image forming apparatus to execute a particular operation that requires manager-level authorization. This method does not cancel the verification of the previously-logged-in user, who is a non-manager. In this way, the present invention provides for execution of an operation without logging-out the previous, non-manager user and by allowing a temporary verification by a manager user.
  • A fifth embodiment is now described with reference to FIGS. 14 and 15. FIG. 14 is a four-part diagram illustrating (a) a default display during a job operation, (b) a display corresponding to a job reset request, (c) a display corresponding to a job reset request during a print job, and (d) a display corresponding to the selection of an “all job” reset request. FIG. 15 is a sequence chart illustrating processes performed during operation of the MFP 1 in accordance with the fifth embodiment of the present invention.
  • In the fifth embodiment of the present invention, when the “printing document” key 33 or the “all job” key 34 is selected in job abort window 32 after the “job reset” key 31 is selected in default window 30, a one shot verification window 37 is displayed. In this embodiment, each process that requires a one-shot verification by a manager-level user in order to be executable is performed only once by the MFP 1.
  • When the “job reset” key 31 is selected when no users are logged into the MFP 1, the job abort window 32 is displayed. If the “printing document” key 33 is pushed down, the one shot verification window 37 is displayed. When a user name of user A, who is a non-manager user, is entered in the input area 38 and a corresponding password is entered in the input area 39, the verification is confirmed and a window similar to the print job abort window 36 shown in FIG. 10 is displayed.
  • Referring to FIG. 10, when the “undelete” key 40 is selected without resetting the current printing job, the display of the operation panel 10 reverts back to the job abort window 32. When the “all job” key 34 is selected by logged-in user A, the UCS 4 determines if the “all job” process is executable. Because user A does not have manager-level authority, the one shot verification window 37 is displayed again, and a verification of user A is then canceled.
  • Subsequently, when a user name of user B, who has manager-level authorization, is entered in the input area 38 of the one shot verification window 37 and a corresponding password is entered in the input area 39, the verification of user B is confirmed, and the “all job” reset operation can be performed.
  • In this embodiment, the accidental deletion of all stored printing data, including confidential data, by a general user is avoided. Specifically, only a manager-level user can manage the handling of print data corresponding to different jobs.
  • FIG. 16 illustrates an alternative process sequence of the fifth embodiment of the present invention. When the “all reset” job process is selected by user A, who is currently logged in, the UCS 4 determines that the operation cannot be executed because user A is not a manager (“operation impossible” in FIG. 16B). The one shot verification window 37 (FIG. 14) is then displayed. However, instead of canceling the verification of user A when the one shot verification window 37 is displayed in this alternative embodiment, user A is logged-out only after verification from user B is confirmed via the one shot verification window 37.
  • If user B does not log into the MFP 1, an additional login process for obtaining the verification of user A is not needed as the previous verification of user A is stored in the MFP 1. Thus, operation errors associated with re-verifications can be reduced and the operability of the MFP 1 can be improved.
  • A sixth embodiment of the present invention is described below with reference to FIG. 17, which illustrates (a) a display of a system default setting and (b) a display of a job reset authorization setting. In previously-described embodiments of the present invention, only a manager user is capable of successfully requesting an “all job” reset operation. However, in the sixth embodiment of the present invention, an adaptive range of users who are permitted to request an “all job” reset operation can be modified by a manager. With this capability, even general users may be permitted to request an “all job” reset operation.
  • Part (a) of FIG. 17 illustrates a system default setting window 50 that is displayed on the operation panel 10 and that allows modification of the adaptive range of users that can request an “all job” reset operation. A login process is first executed by user B, who is a manager, from the operation panel display 20 shown in FIG. 4. When the “system default setting” key 23 is pushed down, the system default setting window 50 shown in FIG. 17 is displayed.
  • When the “job reset permission” key 51 in the system default setting window 50 is selected, the window shifts to the job reset permission setting window 52 shown in FIG. 17. If the “all user” key 53 is selected by user B, the corresponding operation is executed. Consequently, all types of logged-in users, including non-manager users, can successfully request an “all job” reset operation. Further, by selecting the “no verification” key 54 in the job reset permission setting window 52 of FIG. 17, user B can allow all users of the MFP 1 to request an “all job” reset even if they are not logged-into the MFP 1.
  • In addition, when the MFP 1 is in a service maintenance mode, in which repairs and adjustments of the apparatus are made, all maintenance functions are given priority. In this special mode, service personnel are allowed to operate all aspects of the MFP 1, including job reset operations, after entering a pre-determined code or sequence of key selections (e.g., a number combination via the operation panel 10) instead of logging in via a display window.
  • As described above, in this embodiment, the apparatus allows a manager to select a range of permitted users for an “all job” reset operation to be (1) all users with login verification, (2) or all users, verified or unverified. Also, the sixth embodiment of the present invention provides for a special maintenance mode to allow service personnel to gain control of the MFP 1 without going through a normal login process (e.g., requiring a user name and password). Moreover, further to the example illustrated in FIG. 17, the job reset permission setting window 52 can be used to register or modify the user identifications and passwords for each manager and general user.
  • As described above, the various aspects of the present invention provide for an image forming apparatus that can determine the authorization levels of users. Because the confidentiality of stored data is maintained and an appropriate verification is demanded for each user requesting an operation, the burden for verification can be reduced. Also, the image forming apparatus of the present invention is useful for using print managing information to maintain a confidentiality of the print data.
  • Obviously, numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the present invention may be practiced otherwise than as specifically described herein.
  • This patent document is based on and claims priority to Japanese patent application No. 2004-157343, filed on May 27, 2004, the entire contents of which are hereby incorporated herein by reference.

Claims (35)

1. An image forming apparatus comprising:
a communication interface configured to couple to a network;
a printing unit configured to process print data received via the communication interface;
a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users; and
a managing unit configured to determine if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and configured to manage a verification process for the plurality of users based on the corresponding hierarchy information.
2. The image forming apparatus of claim 1, wherein the registration unit includes an operation panel.
3. The image forming apparatus of claim 2, wherein the operation panel includes a touchscreen, and the first user requests the operation by selecting a key corresponding to the operation on the touchscreen.
4. The image forming apparatus of claim 1, further comprising:
a scanning unit configured to optically scan a document; and
a facsimile unit configured to transmit and receive information via facsimile communication.
5. The image forming apparatus of claim 1, wherein,
the registration unit is configured to allow a first user of the plurality of users to input hierarchy information of the first user, is configured to allow the first user to enter a verification information of the first user, and is configured to allow the first user to request one of the operations of the image forming apparatus, and
the management unit is configured to determine if the operation requested by the first user is executable based on the hierarchy information of the first user after the verification information of the first user is stored in the image forming apparatus.
6. The image forming apparatus of claim 5, wherein when the management unit determines that the hierarchy information of the first user does not allow for execution of the operation, the management unit is configured to delete the verification information of the first user and to request another verification information.
7. The image forming apparatus of claim 6, wherein the management unit requests the other verification information by controlling the registration unit to display a login window.
8. The image forming apparatus of claim 5, wherein when the management unit determines that the hierarchy information of the first user does not allow for execution of the operation, the management unit is configured to,
request another verification information,
delete the verification information of the first user when a new verification information is received, and
continue to store the verification information of the first user in the image forming apparatus when a new verification information is not received.
9. The image forming apparatus of claim 5, wherein when the management unit determines that the hierarchy information of the first user does not allow for execution of the operation, the management unit is configured to,
request and receive a verification information of a second user,
retrieve hierarchy information of the second user that is stored in the image forming apparatus, and
determine if the operation can be executed based on the hierarchy information of the second user while continuing to store the verification information of the first user in the image forming apparatus.
10. The image forming apparatus of claim 9, wherein when the management unit determines that the operation can be executed based on the hierarchy information of the second user, the management unit is configured to delete the verification information of the first user.
11. The image forming apparatus of claim 9, wherein when the management unit determines that the operation can be executed based on the hierarchy information of the second user, the management unit is configured to,
execute the operation once, and
delete the verification information of the second user while continuing to store the verification information of the first user in the image forming apparatus.
12. The image forming apparatus as claimed in claim 5, wherein the operation is a cancellation operation to delete all printing data stored in the image forming apparatus.
13. The image forming apparatus of claim 5, wherein the operation can be executed when the hierarchy information of the first user is one of a manager-level authorization.
14. The image forming apparatus of claim 5, wherein the operation can be executed when a verification information of any user is stored in the management unit.
15. The image forming apparatus of claim 5, wherein the operation can be executed when no verification information of any user is stored in the management unit.
16. The image forming apparatus of claim 5, wherein when the hierarchy information of the first user indicates manager-level authorization, the registration unit is configured to allow the first user to select a range of users for which the cancellation operation can be executed.
17. The image forming apparatus of claim 5, wherein the registration unit is configured to allow entry of a service maintenance code to activate in the image forming apparatus a service maintenance mode, in which any operation can be selected and executed.
18. A method for controlling an image forming apparatus:
receiving print data via a communication interface of the image forming apparatus;
generating a printed document based on the print data;
registering a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users;
determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information; and
managing a verification process of the image forming apparatus for the plurality of users based on the corresponding hierarchy information.
19. The method of claim 18, wherein the registering includes receiving hierarchy information of a first user of the plurality of users, and storing the hierarchy information of the first user in an address book memory of the image forming apparatus, the method further comprising:
receiving a verification information of identification of the first user;
storing the verification information of the first user in the image forming apparatus;
receiving a request to execute an operation of the image forming apparatus; and
determining if the operation is executable based on the hierarchy information of the first user.
20. The method of claim 19, wherein the determining includes accessing a user authority table stored in the image forming apparatus and comparing the hierarchy information of the first user to the contents of the user authority table.
21. The method of claim 19, further comprising:
deleting the verification information of the first user when the hierarchy information of the first user does not allow for execution of the operation; and
requesting another verification information.
22. The method of claim 21, wherein the requesting of the other verification information includes displaying a login window on an operation panel of the image forming apparatus.
23. The method of claim 19, further comprising:
requesting another verification information when the hierarchy information of the first user does not allow for execution of the operation;
deleting the verification information of the first user when a new verification information is received; and
continuing to store the verification information of the first user when a new verification information is not received.
24. The method of claim 19, further comprising:
requesting another verification information when the hierarchy information of the first user does not allow for execution of the operation;
receiving a verification information of a second user;
retrieving hierarchy information of the second user that is stored in the address book memory; and
determining if the operation can be executed based on the hierarchy information of the second user while continuing to store the verification information of the first user.
25. The method of claim 24, further comprising:
deleting the verification information of the first user when the operation can be executed based on the hierarchy information of the second user.
26. The method of claim 24, further comprising:
executing the operation once when the operation can be executed based on the hierarchy information of the second user; and
deleting the verification information of the second user while continuing to store the verification information of the first user.
27. The method of claim 19, further comprising:
receiving via an operation panel of the image forming apparatus a request to set a range of users for which the operation can be executed; and
storing the requested range of users in the image forming apparatus.
28. The method of claim 19, wherein the receiving of the request to execute the operation includes receiving a request to delete all printing data stored in the image forming apparatus.
29. The method of claim 18, further comprising:
receiving a service maintenance code via an operation panel of the image forming apparatus; and
executing any selected operating of the image forming apparatus after the service maintenance code is verified.
30. The method of claim 18, wherein the image forming apparatus is a multi-function printer, the method further comprising:
controlling the image forming apparatus to selectively function as a printer, a copier, a facsimile device, and a scanner.
31. The method of claim 19, wherein the receiving of the hierarchy information of the first user includes receiving the hierarchy information of the first user from an operation panel of the image forming apparatus.
32. An image forming apparatus comprising:
a communication interface configured to couple to a network;
a printing unit configured to process print data received via the communication interface;
a registration unit configured to register a plurality of user information for a plurality of users, each of the plurality of user information including hierarchy information corresponding to one of the plurality of users; and
means for managing the image forming apparatus, including means for determining if operations of the image forming apparatus requested by the plurality of users are executable based on the corresponding hierarchy information, and means for managing a verification process for the plurality of users based on the corresponding hierarchy information.
33. The image forming apparatus of claim 32, wherein,
the registration unit is configured to allow a first user of the plurality of users to input hierarchy information of the first user, is configured to allow the first user to enter a verification information of the first user, and is configured to allow the first user to request one of the operations of the image forming apparatus, and
the means for determining determines if the operation requested by the first user is executable based on the hierarchy information of the first user after the verification information of the first user is stored in the image forming apparatus.
34. The image forming apparatus of claim 33, wherein when the means for determining determines that the hierarchy information of the first user does not allow for execution of the operation, the means for managing performs the functions of,
requesting another verification information,
deleting the verification information of the first user when a new verification information is received, and
continuing to store the verification information of the first user in the image forming apparatus when a new verification information is not received.
35. The image forming apparatus of claim 33, wherein when the means for determining determines that the hierarchy information of the first user does not allow for execution of the operation, the means for managing performs the functions of,
requesting and receiving a verification information of a second user,
retrieving hierarchy information of the second user that is stored in the image forming apparatus, and
determining if the operation can be executed based on the hierarchy information of the second user while continuing to store the verification information of the first user in the image forming apparatus.
US11/136,467 2004-05-27 2005-05-25 Image forming apparatus and verification control method thereof Expired - Fee Related US7343114B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JPJPAP2004-157343 2004-05-27
JP2004157343A JP2005335215A (en) 2004-05-27 2004-05-27 Image forming apparatus and method of controlling authentication

Publications (2)

Publication Number Publication Date
US20050265744A1 true US20050265744A1 (en) 2005-12-01
US7343114B2 US7343114B2 (en) 2008-03-11

Family

ID=35425402

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/136,467 Expired - Fee Related US7343114B2 (en) 2004-05-27 2005-05-25 Image forming apparatus and verification control method thereof

Country Status (2)

Country Link
US (1) US7343114B2 (en)
JP (1) JP2005335215A (en)

Cited By (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076241A1 (en) * 2005-09-30 2007-04-05 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070127050A1 (en) * 2005-12-02 2007-06-07 Nobuyuki Iwata Image forming apparatus, image forming method, and computer program product
US20070150682A1 (en) * 2005-12-05 2007-06-28 Naruhiko Ogasawara Data processing apparatus maintaining consistency of operation
US20070214494A1 (en) * 2006-03-13 2007-09-13 Hiroya Uruta Image forming apparatus capable of allowing easy operation of data while maintaining confidentiality
US20070256020A1 (en) * 2006-04-27 2007-11-01 Konica Minolta Business Technologies Inc. Information processing apparatus, method for controlling information processing apparatus and recording medium
US20080016450A1 (en) * 2006-06-29 2008-01-17 Yoshiko Aono Image forming device
US20080092231A1 (en) * 2006-10-17 2008-04-17 Sharp Kabushiki Kaisha Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus
US20080104707A1 (en) * 2006-10-31 2008-05-01 Konica Minolta Business Technologies, Inc. Image processing apparatus, image processing method and recording medium
US20080201775A1 (en) * 2007-02-20 2008-08-21 Brother Kogyo Kabushiki Kaisha Multifunction peripheral, password setting system, method and computer readable medium for password setting
US20090103937A1 (en) * 2007-10-17 2009-04-23 Tomoo Kudo Image Forming Apparatus
US20090193504A1 (en) * 2008-01-28 2009-07-30 Seiko Epson Corporation Device Controller, System, and Method for Authenticated Printing
US20090235173A1 (en) * 2008-03-17 2009-09-17 Masahiro Ichihara Image forming apparatus, operation-screen changing method, and computer-readable recording medium
EP2136544A1 (en) * 2007-03-08 2009-12-23 Sharp Kabushiki Kaisha Communication device
US20100088609A1 (en) * 2008-10-08 2010-04-08 Canon Kabushiki Kaisha Management apparatus, image forming apparatus, and service processing method
US20100115608A1 (en) * 2008-11-04 2010-05-06 Canon Kabushiki Kaisha Image processing apparatus, control method therefor, and computer-readable storage medium storing program for implementing the method
US7826081B2 (en) 2004-10-08 2010-11-02 Sharp Laboratories Of America, Inc. Methods and systems for receiving localized display elements at an imaging device
US7870185B2 (en) 2004-10-08 2011-01-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration
US7873553B2 (en) 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for authorizing imaging device concurrent account use
US7873718B2 (en) 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server recovery
US7920101B2 (en) 2004-10-08 2011-04-05 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display standardization
US7934217B2 (en) 2004-10-08 2011-04-26 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access to an imaging device
US7941743B2 (en) 2004-10-08 2011-05-10 Sharp Laboratories Of America, Inc. Methods and systems for imaging device form field management
US7966396B2 (en) 2004-10-08 2011-06-21 Sharp Laboratories Of America, Inc. Methods and systems for administrating imaging device event notification
US7970813B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration and subscription
US7969596B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document translation
US7978618B2 (en) * 2004-10-08 2011-07-12 Sharp Laboratories Of America, Inc. Methods and systems for user interface customization
US8001183B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device related event notification
US8001587B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management
US8001586B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management and authentication
US8006293B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential acceptance
US8006292B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission and consolidation
US8015234B2 (en) 2004-10-08 2011-09-06 Sharp Laboratories Of America, Inc. Methods and systems for administering imaging device notification access control
US8018610B2 (en) 2004-10-08 2011-09-13 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote application interaction
US8024792B2 (en) 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission
US8023130B2 (en) 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data maintenance
US8032608B2 (en) 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for imaging device notification access control
US8032579B2 (en) 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device notification access control
US8035831B2 (en) 2004-10-08 2011-10-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote form management
US8049677B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display element localization
US8051140B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device control
US8051125B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device event notification subscription
US8060921B2 (en) 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential authentication and communication
US8060930B2 (en) 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential receipt and authentication
US8065384B2 (en) 2004-10-08 2011-11-22 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification subscription
US8115945B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for imaging device job configuration management
US8115947B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for providing remote, descriptor-related data to an imaging device
US8115946B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and sytems for imaging device job definition
US8115944B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for local configuration-based imaging device accounting
US8120799B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for accessing remote, descriptor-related data at an imaging device
US8120793B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for displaying content on an imaging device
US8120798B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for providing access to remote, descriptor-related data at an imaging device
US8120797B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for transmitting content to an imaging device
US8125666B2 (en) 2004-10-08 2012-02-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document management
US8156424B2 (en) 2004-10-08 2012-04-10 Sharp Laboratories Of America, Inc. Methods and systems for imaging device dynamic document creation and organization
US8171404B2 (en) 2004-10-08 2012-05-01 Sharp Laboratories Of America, Inc. Methods and systems for disassembly and reassembly of examination documents
US8213034B2 (en) 2004-10-08 2012-07-03 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access on an imaging device
US8230328B2 (en) 2004-10-08 2012-07-24 Sharp Laboratories Of America, Inc. Methods and systems for distributing localized display elements to an imaging device
US8237946B2 (en) 2004-10-08 2012-08-07 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server redundancy
US8345272B2 (en) 2006-09-28 2013-01-01 Sharp Laboratories Of America, Inc. Methods and systems for third-party control of remote imaging jobs
US8384925B2 (en) 2004-10-08 2013-02-26 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data management
US8428484B2 (en) 2005-03-04 2013-04-23 Sharp Laboratories Of America, Inc. Methods and systems for peripheral accounting
US20150373215A1 (en) * 2014-06-24 2015-12-24 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US9329813B2 (en) 2014-08-29 2016-05-03 Seiko Epson Corporation Processing management system, electronic apparatus, management server and processing management method of electronic apparatus
WO2017073008A1 (en) * 2015-10-29 2017-05-04 Canon Kabushiki Kaisha Information processing apparatus, information terminal, method of controlling the same, print system, and storage medium
US20180005104A1 (en) * 2016-07-01 2018-01-04 Kyocera Document Solutions Maintenance system, and computer readable recording medium storing a maintenance program

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7697851B2 (en) * 2006-08-03 2010-04-13 Ricoh Company, Ltd. User initiated alerts in a document processing environment
US7729630B2 (en) * 2007-01-24 2010-06-01 Kabushiki Kaisha Toshiba System and method for generating a user customizable default user interface for a document processing device
JP4510866B2 (en) * 2007-10-30 2010-07-28 キヤノンItソリューションズ株式会社 Image forming apparatus, printing system, printing method, and program
JP4922958B2 (en) 2008-02-01 2012-04-25 株式会社リコー Image forming apparatus, image forming method, and image forming program
JP2009214320A (en) * 2008-03-07 2009-09-24 Ricoh Co Ltd Image forming apparatus, image forming system, image forming method, and program
JP4670907B2 (en) * 2008-06-13 2011-04-13 コニカミノルタビジネステクノロジーズ株式会社 Image processing apparatus, image processing system, and control program for image processing apparatus
JP4855531B2 (en) * 2010-04-28 2012-01-18 キヤノンソフトウェア株式会社 Image forming apparatus, printing system, printing method, and program
JP5741048B2 (en) 2011-02-21 2015-07-01 株式会社リコー Image forming apparatus, authentication program, and storage medium
JP6223205B2 (en) * 2014-01-27 2017-11-01 キヤノン株式会社 Image forming apparatus, control method therefor, and program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060062588A1 (en) * 2004-09-17 2006-03-23 Konica Minolta Business Technologies, Inc. Job execution system and job execution method, and job execution apparatus and image forming apparatus used for this system
US20060067722A1 (en) * 2004-09-24 2006-03-30 Fuji Xerox Co., Ltd. Image forming device and its control method
US7181150B2 (en) * 2003-12-02 2007-02-20 Ricoh Company, Ltd. Reservation job security established image forming apparatus, control program, and recording medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4019344B2 (en) 2000-05-19 2007-12-12 株式会社リコー Printing device
JP4261781B2 (en) 2001-08-09 2009-04-30 キヤノン株式会社 Information management apparatus, information management control method, and program
JP2003226047A (en) 2002-02-01 2003-08-12 Ricoh Co Ltd Imaging apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181150B2 (en) * 2003-12-02 2007-02-20 Ricoh Company, Ltd. Reservation job security established image forming apparatus, control program, and recording medium
US20060062588A1 (en) * 2004-09-17 2006-03-23 Konica Minolta Business Technologies, Inc. Job execution system and job execution method, and job execution apparatus and image forming apparatus used for this system
US20060067722A1 (en) * 2004-09-24 2006-03-30 Fuji Xerox Co., Ltd. Image forming device and its control method

Cited By (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8051125B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device event notification subscription
US8270003B2 (en) 2004-10-08 2012-09-18 Sharp Laboratories Of America, Inc. Methods and systems for integrating imaging device display content
US8384925B2 (en) 2004-10-08 2013-02-26 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data management
US8237946B2 (en) 2004-10-08 2012-08-07 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server redundancy
US8230328B2 (en) 2004-10-08 2012-07-24 Sharp Laboratories Of America, Inc. Methods and systems for distributing localized display elements to an imaging device
US8213034B2 (en) 2004-10-08 2012-07-03 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access on an imaging device
US8201077B2 (en) 2004-10-08 2012-06-12 Sharp Laboratories Of America, Inc. Methods and systems for imaging device form generation and form field data management
US8171404B2 (en) 2004-10-08 2012-05-01 Sharp Laboratories Of America, Inc. Methods and systems for disassembly and reassembly of examination documents
US8156424B2 (en) 2004-10-08 2012-04-10 Sharp Laboratories Of America, Inc. Methods and systems for imaging device dynamic document creation and organization
US8125666B2 (en) 2004-10-08 2012-02-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document management
US8120797B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for transmitting content to an imaging device
US8060930B2 (en) 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential receipt and authentication
US8120798B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for providing access to remote, descriptor-related data at an imaging device
US8120793B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for displaying content on an imaging device
US8120799B2 (en) 2004-10-08 2012-02-21 Sharp Laboratories Of America, Inc. Methods and systems for accessing remote, descriptor-related data at an imaging device
US7826081B2 (en) 2004-10-08 2010-11-02 Sharp Laboratories Of America, Inc. Methods and systems for receiving localized display elements at an imaging device
US8115944B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for local configuration-based imaging device accounting
US7870185B2 (en) 2004-10-08 2011-01-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration
US7873553B2 (en) 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for authorizing imaging device concurrent account use
US7873718B2 (en) 2004-10-08 2011-01-18 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting server recovery
US7920101B2 (en) 2004-10-08 2011-04-05 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display standardization
US7934217B2 (en) 2004-10-08 2011-04-26 Sharp Laboratories Of America, Inc. Methods and systems for providing remote file structure access to an imaging device
US7941743B2 (en) 2004-10-08 2011-05-10 Sharp Laboratories Of America, Inc. Methods and systems for imaging device form field management
US7966396B2 (en) 2004-10-08 2011-06-21 Sharp Laboratories Of America, Inc. Methods and systems for administrating imaging device event notification
US7970813B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification administration and subscription
US7969596B2 (en) 2004-10-08 2011-06-28 Sharp Laboratories Of America, Inc. Methods and systems for imaging device document translation
US7978618B2 (en) * 2004-10-08 2011-07-12 Sharp Laboratories Of America, Inc. Methods and systems for user interface customization
US8060921B2 (en) 2004-10-08 2011-11-15 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential authentication and communication
US8001587B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management
US8001586B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential management and authentication
US8006176B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging-device-based form field management
US8006293B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential acceptance
US8006292B2 (en) 2004-10-08 2011-08-23 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission and consolidation
US8015234B2 (en) 2004-10-08 2011-09-06 Sharp Laboratories Of America, Inc. Methods and systems for administering imaging device notification access control
US8018610B2 (en) 2004-10-08 2011-09-13 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote application interaction
US8024792B2 (en) 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device credential submission
US8023130B2 (en) 2004-10-08 2011-09-20 Sharp Laboratories Of America, Inc. Methods and systems for imaging device accounting data maintenance
US8032608B2 (en) 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for imaging device notification access control
US8032579B2 (en) 2004-10-08 2011-10-04 Sharp Laboratories Of America, Inc. Methods and systems for obtaining imaging device notification access control
US8035831B2 (en) 2004-10-08 2011-10-11 Sharp Laboratories Of America, Inc. Methods and systems for imaging device remote form management
US8049677B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device display element localization
US8051140B2 (en) 2004-10-08 2011-11-01 Sharp Laboratories Of America, Inc. Methods and systems for imaging device control
US8115946B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and sytems for imaging device job definition
US8001183B2 (en) 2004-10-08 2011-08-16 Sharp Laboratories Of America, Inc. Methods and systems for imaging device related event notification
US8115947B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for providing remote, descriptor-related data to an imaging device
US8065384B2 (en) 2004-10-08 2011-11-22 Sharp Laboratories Of America, Inc. Methods and systems for imaging device event notification subscription
US8115945B2 (en) 2004-10-08 2012-02-14 Sharp Laboratories Of America, Inc. Methods and systems for imaging device job configuration management
US8106922B2 (en) 2004-10-08 2012-01-31 Sharp Laboratories Of America, Inc. Methods and systems for imaging device data display
US8428484B2 (en) 2005-03-04 2013-04-23 Sharp Laboratories Of America, Inc. Methods and systems for peripheral accounting
US8089649B2 (en) * 2005-09-30 2012-01-03 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070076241A1 (en) * 2005-09-30 2007-04-05 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070127050A1 (en) * 2005-12-02 2007-06-07 Nobuyuki Iwata Image forming apparatus, image forming method, and computer program product
US20070150682A1 (en) * 2005-12-05 2007-06-28 Naruhiko Ogasawara Data processing apparatus maintaining consistency of operation
US8185948B2 (en) * 2006-03-13 2012-05-22 Ricoh Company, Ltd. Image forming apparatus capable of allowing easy operation of data while maintaining confidentiality
US20070214494A1 (en) * 2006-03-13 2007-09-13 Hiroya Uruta Image forming apparatus capable of allowing easy operation of data while maintaining confidentiality
US20070256020A1 (en) * 2006-04-27 2007-11-01 Konica Minolta Business Technologies Inc. Information processing apparatus, method for controlling information processing apparatus and recording medium
US20080016450A1 (en) * 2006-06-29 2008-01-17 Yoshiko Aono Image forming device
US8345272B2 (en) 2006-09-28 2013-01-01 Sharp Laboratories Of America, Inc. Methods and systems for third-party control of remote imaging jobs
US8578475B2 (en) * 2006-10-17 2013-11-05 Sharp Kabushiki Kaisha Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus
US20080092231A1 (en) * 2006-10-17 2008-04-17 Sharp Kabushiki Kaisha Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus
US20080104707A1 (en) * 2006-10-31 2008-05-01 Konica Minolta Business Technologies, Inc. Image processing apparatus, image processing method and recording medium
US8230494B2 (en) * 2006-10-31 2012-07-24 Konica Minolta Business Technologies, Inc. Image processing apparatus, image processing method and recording medium
US20080201775A1 (en) * 2007-02-20 2008-08-21 Brother Kogyo Kabushiki Kaisha Multifunction peripheral, password setting system, method and computer readable medium for password setting
EP2136544A1 (en) * 2007-03-08 2009-12-23 Sharp Kabushiki Kaisha Communication device
EP2136544A4 (en) * 2007-03-08 2010-12-08 Sharp Kk Communication device
US20090103937A1 (en) * 2007-10-17 2009-04-23 Tomoo Kudo Image Forming Apparatus
US20090193504A1 (en) * 2008-01-28 2009-07-30 Seiko Epson Corporation Device Controller, System, and Method for Authenticated Printing
US8356339B2 (en) * 2008-01-28 2013-01-15 Seiko Epson Corporation Device controller, system, and method for authenticated printing
US8589797B2 (en) * 2008-03-17 2013-11-19 Ricoh Company, Limited Image forming apparatus, operation-screen changing method, and computer-readable recording medium
US20090235173A1 (en) * 2008-03-17 2009-09-17 Masahiro Ichihara Image forming apparatus, operation-screen changing method, and computer-readable recording medium
US8381111B2 (en) * 2008-10-08 2013-02-19 Canon Kabushiki Kaisha Management apparatus, image forming apparatus, and service processing method
US20100088609A1 (en) * 2008-10-08 2010-04-08 Canon Kabushiki Kaisha Management apparatus, image forming apparatus, and service processing method
US20100115608A1 (en) * 2008-11-04 2010-05-06 Canon Kabushiki Kaisha Image processing apparatus, control method therefor, and computer-readable storage medium storing program for implementing the method
US10061931B2 (en) 2008-11-04 2018-08-28 Canon Kabushiki Kaisha Image processing apparatus, control method therefor, and computer-readable storage medium storing program for implementing the method
US10701242B2 (en) * 2014-06-24 2020-06-30 Canon Kabushiki Kaisha Image forming apparatus having authentication function(s), and control method of image forming apparatus
US20150373215A1 (en) * 2014-06-24 2015-12-24 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US10367973B2 (en) * 2014-06-24 2019-07-30 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US20190281190A1 (en) * 2014-06-24 2019-09-12 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US9936101B2 (en) * 2014-06-24 2018-04-03 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US20180176418A1 (en) * 2014-06-24 2018-06-21 Canon Kabushiki Kaisha Image forming apparatus, and control method of image forming apparatus
US9329813B2 (en) 2014-08-29 2016-05-03 Seiko Epson Corporation Processing management system, electronic apparatus, management server and processing management method of electronic apparatus
WO2017073008A1 (en) * 2015-10-29 2017-05-04 Canon Kabushiki Kaisha Information processing apparatus, information terminal, method of controlling the same, print system, and storage medium
US10666817B2 (en) 2015-10-29 2020-05-26 Canon Kabushiki Kaisha Information processing apparatus, information terminal, method of controlling the same, print system, and storage medium that provide a feature of not showing an operation screen when another user is logged in
US11336781B2 (en) 2015-10-29 2022-05-17 Canon Kabushiki Kaisha Communication system including information processing apparatus and image processing apparatus, and information processing apparatus thereof, and storage medium that allow displaying of information associated with verified user authentication information
US20180005104A1 (en) * 2016-07-01 2018-01-04 Kyocera Document Solutions Maintenance system, and computer readable recording medium storing a maintenance program
US10289948B2 (en) * 2016-07-01 2019-05-14 Kyocera Document Solutions, Inc. Maintenance system, and computer readable recording medium storing a maintenance program

Also Published As

Publication number Publication date
US7343114B2 (en) 2008-03-11
JP2005335215A (en) 2005-12-08

Similar Documents

Publication Publication Date Title
US7343114B2 (en) Image forming apparatus and verification control method thereof
US20210223973A1 (en) Data communication system device and method
US7487233B2 (en) Device access based on centralized authentication
US7167919B2 (en) Two-pass device access management
US9858430B2 (en) Image processing apparatus, method for controlling the same, program, and storage medium
JP5069819B2 (en) Image forming system
US7812984B2 (en) Remote stored print job retrieval
US20080178265A1 (en) Information processing system, information processing apparatus and method and program therefor
US20110113469A1 (en) Network synchronization system and information processing apparatus
US20110093921A1 (en) Multi-functional peripheral and multi-functional peripheral control system
US9836254B2 (en) Image forming apparatus, control method therefor, and storage medium storing control program therefor
EP2763392B1 (en) Image processing apparatus and image processing system
US9477434B2 (en) Image forming apparatus, job execution system, and job execution method
EP1783653B1 (en) Login control for multiple applications
JP6993910B2 (en) Information processing equipment, its control method, and programs
US10560477B2 (en) Information processing system, control method therefor, image processing apparatus, control method therefor, and storage medium storing control program therefor
JP5286232B2 (en) Image forming system and user manager server device
US20110304864A1 (en) System, apparatus, and method for controlling use of function of image processing apparatus
US20190235798A1 (en) Image forming system that reduces time and effort of setting in printer driver of user terminal
JP2022033937A (en) Information processing apparatus, control method of the same, and program
JP2023029480A (en) Image processing apparatus, control method thereof, and program

Legal Events

Date Code Title Description
AS Assignment

Owner name: RICOH COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:URUTA, HIROYA;REEL/FRAME:016603/0959

Effective date: 20050516

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200311